• Title/Summary/Keyword: Research Information Systems

Search Result 12,210, Processing Time 0.043 seconds

A Study on the Efficient Use of Database and the Office Information System (데이터베이스의 효율적 이용을 위한 사무실 정보시스템에 관한 연구)

  • Ko Young-Man
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.21
    • /
    • pp.169-190
    • /
    • 1991
  • The purpose of this study is to investigate aspects of office information systems in japanese corporations in order to understand introduction strategies and to find out whether strategy elements could be transferred to Germany. In this study, three points of view played an important role. (a) Technological and infrastructural support systems What kind of role did the liberalization of telecommunication markets and the avaliability of computer hardware play to help develope of database industry and implement office information systems? (b) Strategies and forms of the implementation of office information system: Which strategies were successful, distribution or centralization? How were technical and organizational problems handled? (c) Process of data communication : How did the implementation of office information system change the data communication with in-house or commercial database systems? To answer these questions, this study centered around a two-step field research in Japan. (1) Screening stage: to gain a general overview of office information system in Japan. The results of this initial research have been analysed and carefully evaluated to prepare for the second and major part of field research in Japan. (2) Data collection stage: interviews with respective managers, heads offices, and data processing units in 20 enterprises. The major results of this study are as follows. Today in Japan, office information system is understood as the interconnection of the in-house and commercial database for the maximization of the use of information resource In an organization. In particular, developments in the direction of distributed systems and the 'intelligent office' by means of the new information and communication technologies are very important.

  • PDF

Decision on Replacing Security Components for Infer]nation Systems (정보시스템 도입에 따른 보안기능 컴포넌트 대체 수준 의사결정)

  • Choi Myeonggil;Kim Hyunwoo;Kim Eunhye;Kim Sehun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.147-157
    • /
    • 2004
  • Enterprises and governments currently utilize COTS based information systems which are a kind of component based systems. Especially, COTS are widely utilized as information security systems and information systems including information security functions. This paper suggests an appropriate adaptation level of security functional components and a cost effective priority among them. To make a cost effective decision on adapting security functional components, this paper develops a hierarchical model of information security technologies and analyzes findings through multiple decision-making criteria.

  • PDF

New Scattering Matrix Model for Modeling Ferrite Media Using the TLM Method

  • Zugari, Asmaa;El Adraoui, Soufiane;Yaich, Mohamed Iben;Khalladi, Mohsine
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.536-541
    • /
    • 2012
  • This paper aims to extend the transmission line matrix method with a hybrid symmetrical condensed node (HSCN) to model ferrite media in the time domain. To take into account the anisotropy and dispersive properties of ferrite media, equivalent current sources are incorporated into supplementary stubs of the original HSCN. The scattering matrix of the proposed HSCN is provided, and the validity of this approach is demonstrated for both transversely and longitudinally magnetized ferrites. Agreement is achieved between the results of this approach and those of the theoretical and the finite-difference time-domain method.

A Study of Information Systems Development for Marketing Strategy (효율적(效率的)인 마아케팅 정보(情報) 시스템 구축(構築) 방안(方案)에 관한 연구(硏究))

  • Won, Doo-Hi
    • Korean Business Review
    • /
    • v.4
    • /
    • pp.355-383
    • /
    • 1991
  • 1. The Purpose of This study research: The focus of marketing until recently has simply been on sales which means the transfer of goods from the producer to the consumer and on profits therefrom. However, the excess supply of goods due to the expansion of the economy and the resulting fierce competition between companies have changed the nature of marketing. Maximizing consumers' satisfaction and establishing marketing mix strategies for market subdivision and penetration into the target market are now significant roles of the marketing manager. In addition, with regard to company management, information within the company which had been collected, managed and processed sporadically indegrated manner. The purpose of this research on marketing information systems in connection with the above will be to seek ways enabling us to create an efficient and integrated information system for an entire company. 2. The Method and Scop of This Stdudy: Marketing information systems, as a part of management information systems, shall be examined based on relevant theoretical literature. The research process shall be generally developed as follows: 1) The basic structure of the marketing information systems, including its fundamental purpose and necessity, shall be examined. 2) The method for a specific plan shall be presented through fundamental marketing strategy concepts and marketing decision-making. 3) A general model shall be presented based on examinations of various mod els used for marketing information systems and on research of the models' relationship with management information systems. 4) The direction of development shall be presented as the basis for gradual development following examination of the scope, pertinent issues, and means of improvement of the marketing information systems. 3. Summary and Conclusion: As the competition among the enterprises has become keen and thus the management of the contemporary enterprises shows the tendencies of uncertainty as well as complexity, all the managers must make the correct and prompt decision of their mind. Otherwise, the danger which will lead to and failure in the failure in the business may befall to the enterprise. Though computer system and information related techniques have the endless potentiality for the improvement of the enterprise, those are granted only to the enterprise which will be able to manage the computer system and information related techniques. In the contemporary industrial society, the need to a managerial information system has been increasing because all the complicated information can be stored, disposed and managed by the efficient method. And the marketing information system is also the integrated system which has been formed and developed through the efficient mixture of all the constituent elements including the definition of marketing research as the definition of the information system has been enlarged due to the reason shown above. The common point of the two systems is the man machine system functioning to help the efficient decision of the mind by introducing the computer system on the basis of user manager centered thought in order to provide informations to be useful in operation and management of the organization and the function of the mind decision. The purpose for the marketing information system lies in making the utmost use of marketing information available in the course of the mind decision. The reason why the contemporary enterprises necessitate the marketing information system are as follows: 1) The stages of the business operation are expanded wide to the world. 2) As the living standards of the consumers have been on the rise, the enter prise has to satisfy the consumer's "wants" than simple "needs".

  • PDF

The Designs and Implementation of Trusted Channel between Secure Operating Systems

  • Yu, Joon-Suk;Lim, Jae-Deok;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.2117-2120
    • /
    • 2003
  • Trusted channel provides a means of secure communication and it includes security services such as confidentiality, authentication, and so on. This paper describes the implementation of trusted channel between secure operating systems that integrates access control mechanisms with FreeBSD kernel code[1]. The trusted channel we developed offers confidentiality an4 message authentication for network traffic based on the destination address. It is implemented in the kernel level of IP layer and transparent to users.

  • PDF

Early Career Turnover Model and Career Path for Self-realization: Findings in Korea's Information Security Industry

  • Song-Ha Lee;Hyo-Jung Jun;Tae-Sung Kim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1135-1155
    • /
    • 2023
  • Management of the workforce in the early career stage who enter information security work after graduating from college or university so that they can continue to develop their information security careers without leaving the organization can be a solution to the problem of absolute shortage of staffing and lack of skills. This is because the workforce can improve their job skills, and organizations can build a stable, cost-effective human resource management system. This paper constructed and verified a turnover intention research model focusing on the factors that affect the turnover intention of early-stage workforce who took their first steps in society as an information security workforce after graduating from university or college; it confirmed that self-realization is a crucial factor. Furthermore, with in-depth interviews, the career path information of skilled workers, which is essential information necessary for self-realization, was analyzed, and the direction of HRM for self-realization of the workforce in the early career stage was presented.

Verifying Code toward Trustworthy Software

  • Kim, Hyong-Soon;Lee, Eunyoung
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.309-321
    • /
    • 2018
  • In the conventional computing environment, users use only a small number of software systems intensively. So it had been enough to check and guarantee the functional correctness and safety of a small number of giant systems in order to protect the user systems and their information inside the systems from outside attacks. However, checking the correctness and safety of giant systems is not enough anymore, since users are using various software systems or web services provided by unskilled developers. To prove or guarantee the safety of software system, a lot of research has been conducted in diverse areas of computer science. We will discuss the on-going approaches for guaranteeing or verifying the safety of software systems in this paper. We also discuss the future research challenge which must be solved with better solutions in the near future.

Evaluating The Adoption of EDI Systems (EDI 시스템의 도입에 관한 연구)

  • Hwang, Gyeong-Tae
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.86-111
    • /
    • 1995
  • This study investigates a special class of Inter-Organizational Systems, Electronic Data Interchange (EDI) systems. The major objective of this research is to identify the factors that facilitate or inhibit the adoption of an EDI system. A research model is developed to investigate the research questions identified. The adoption of EDI systems is assumed to be affected by four contextual factors: 1. general characteristics of the industry in which a firm operates, 2. EDI-related industry characteristics, 3. general characteristics of the firm, and 4. information technology (IT) related firm characteristics. The findings of this study provide strong supporting evidence that most of the variables proposed and tested in the study are important factors affecting the adoption of EDI systems.

  • PDF

An Empirical Study On Information Systems Operation Cost Estimation Model (정보시스템 운영사업 비용산정 모형 개발에 대한 실증적 연구)

  • Kim, Hyeon-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1810-1817
    • /
    • 2000
  • The purpose of this research is to develop an estimation model for information systems operating costs. Current cost estimation practices and types of sytem management projects have been reviewed an analyses. Typical operating project types of information systems are determined. They are application system operation, help disk operation, network management and operation, and hardware management. For each type of projects, cost factors ar identified and a structure of cost estimation model is defined. Cost estimation models have been constructed and tested by 24 real operation projects data. Statistical analysis shows derived models are statistically significant. User groups' opinion on these draft cost estimation model has been surveyed and summarized. The results of this research can be used as a cornerstone for future research on operating cost estimation, and for cost estimation guideline of information systems operation projects.

  • PDF

Factors Influencing Information Systems Adoption: A Review of the Literature

  • Hakemi, Aida;Masrom, Maslin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.19-26
    • /
    • 2019
  • For the last two decades, a number of information systems are developed for various aims, depending on business' needs. There are a lot of organizations in the world which are using information systems in their environment, such as telecommunications organizations, universities and banks. Using information system has become crucial for most of organizations regarding with increasing the performance of work procedures and improve productivity and efficiency in general. There are many different models that have been designed and validated to explain the effect of constructs on the adoption of technologies. The aim of this research is to review the literature on information systems adoption and to analyze the different types of models which are frequently applied by researchers in their efforts to examine the factors that estimate the adoption of technologies. The research explores information systems adoption literature that focuses on development models.